containing-active-breach
Fail
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyperforms administrative system modifications usingiptablesfor network containment andpowershellfor identity management, which can lead to significant infrastructure impact if misused.\n- [REMOTE_CODE_EXECUTION]: The functionsdisable_ad_accountandreset_ad_passwordinscripts/agent.pyare vulnerable to command injection. They construct PowerShell command strings using f-strings with unsanitized user-provided input, which is then executed viapowershell -Command. This allows an attacker to execute arbitrary PowerShell commands by providing a crafted username.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. Ingestion points: Untrusted incident telemetry and scope data (IPs, account names) processed in the incident response workflow. Boundary markers: None identified. Capability inventory: High-impact administrative control viaiptablesand Active Directory management. Sanitization: No input validation or sanitization is performed on external data before it is passed to system commands.
Recommendations
- AI detected serious security threats
Audit Metadata